Smart grid is a new generation of power grids that is expected to enhance its reliability and reduce carbon footprint by integrating distributed resources.
Design and assemble an inexpensive yet fast and reliable PCConstruct the PC of your dreams using the practical information contained in this hands-on guide.
Reach more customers and grow your business with today's most powerful marketing tool: Word-of-MouthHighly Recommended shows the impact of customer recommendations on businesses--transforming how people buy, how you reach customers, how you improve products, and ultimately how you can grow your company by leveraging the power of recommendations.
“[Tufekci’s] personal experience in the squares and streets, melded with her scholarly insights on technology and communication platforms, makes [this] such an unusual and illuminating work.
An eye-opening look at the invisible workers who protect us from seeing humanity's worst on today's commercial internet Social media on the internet can be a nightmarish place.
Psybersecurity: Human Factors of Cyber Defence is a clarion call to action in the face of a stark reality: over 90% of cyberattacks exploit human vulnerabilities, as highlighted by the 2022 Global Risks Report from the World Economic Forum.
Social media, once heralded as revolutionary and democratic, have instead proved exclusionary and elitist Social media technologies such as YouTube, Twitter, and Facebook promised a new participatory online culture.
This volume looks at the forms and functions of counterspeech as well as what determines its effectiveness and success from multidisciplinary perspectives.
Integration of AI-Based Manufacturing and Industrial Engineering Systems with the Internet of Things describes how AI techniques, such as deep learning, cognitive computing, and Machine Learning, can be used to analyze massive volumes of data produced by IoT devices in manufacturing environments.
In a world where tiny fingers are as familiar with touchscreens as they are with crayons, ensuring our children's safety online has never been more crucial.
The Military Metaverse explores the impact that the Metaverse is having today on how the world's militaries procure, maintain, train, plan, and fight, and how the Metaverse presents new challenges and opportunities for future conflict.
This book offers a comprehensive overview of the theory and practical applications of swarm intelligence in fog computing, beyond 5G networks, and information security.
Absolute Essentials of Ethereum is a concise textbook which guides the reader through the fascinating world of the emerging Ethereum ecosystem, from the basics of how its blockchain works to cutting-edge applications.
Cybersecurity is a paramount concern in both Internet of Things (IoT) and Cyber-Physical Systems (CPSs) due to the interconnected and often critical nature of these systems.
Detailing a comprehensive set of requirements for secure and resilient software development and operation, this book supplies documented test cases for those requirements and best practices for testing nonfunctional requirements.
In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence by Dr.
Information security primarily serves these six distinct purposes-authentication, authorization, prevention of data theft, sensitive data safety / privacy, data protection / integrity, non-repudiation.
This book constitutes the refereed proceedings of the 10th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2018, held in New Orleans, LA, USA, in September 2018.
This book critically assesses how the rise of the collaborative economy in the European Union Digital Single Market is disrupting consolidated legal acquisitions, such as classical internal market categories, as well as the applicability of consumer protection, data protection, and labour and competition law.
This book examines the right to be forgotten and finds that this right enjoys recognition mostly in jurisdictions where privacy interests impose limits on freedom of expression.
Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively bring together the "e;best of the best"e; on what works and what doesn't, as a CISO, in a unique storytelling format.
This book constitutes the proceedings of the 12th International Conference on Network and System Security, NSS 2018, held in Hong Kong, China, in August 2018.
The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.
This book discusses the main legal and economic challenges to the creation and enforcement of security rights in intellectual property and explores possible avenues of reform, such as more specific rules for security in IP rights and better coordination between intellectual property law and secured transactions law.
This book constitutes the thoroughly refereed proceedings of the 11th International Conference on Security for Information Technology and Communications, SecITC 2018, held in Bucharest, Romania, in November 2018.
The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.
This book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018.
The book provides a detailed overview and analysis of important EU Internet regulatory challenges currently found in various key fields of law directly linked to the Internet such as information technology, consumer protection, personal data, e-commerce and copyright law.
This book constitutes the refereed proceedings of the 10th International Conference on Decision and Game Theory for Security, GameSec 2019,held in Stockholm, Sweden, in October 2019.
This book constitutes the proceedings of the 10th International Symposium on Cyberspace Safety and Security, CSS 2018, held in Amalfi, Italy, in October 2018.
This book provides an overview of recent and future legal developments concerning the digital era, to examine the extent to which law has or will further evolve in order to adapt to its new digitalized context.
This book constitutes the refereed proceedings of the 18th International Conference on Engineering Applications of Neural Networks, EANN 2017, held in Athens, Greece, in August 2017.
Big Data and Blockchain Technology for Secure IoT Applications presents a comprehensive exploration of the intersection between two transformative technologies: big data and blockchain, and their integration into securing Internet of Things (IoT) applications.
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.
This book constitutes the refereed proceedings of the 25th Nordic Conference on Secure IT Systems, NordSec 2020, which was organized by Linkoping University, Sweden, and held online during November 23-24, 2020.
This book constitutes the refereed proceedings of the 13th International Conference on Information Systems Security, ICISS 2017, held in Mumbai, India, in December 2017.
This book constitutes the proceedings of the 7th International Workshop on Graphical Models for Security, GramSec 2020, which took place on June 22, 2020.
The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017.
Network Optimization in Intelligent Internet of Things Applications: Principles and Challenges sheds light on the optimization methods that form the basis of effective communication between networked devices.